Managing and Maintaining Windows 8.1
Question No: 121
You administer laptop and desktop computers that run Windows 8 Enterprise in an Active Directory domain. Your company has purchased a subscription to Windows Intune.
You plan to install Intune Endpoint Protection on all computers. Some of the computers also have another antimalware application installed.
You need to ensure that only the Intune Endpoint Protection application is running on all computers.
What should you do?
Configure the Enable Realtime Protection policy to Yes.
Configure the Enable Endpoint Protection policy to Only on computers that are unprotected when Endpoint Protection is installed.
Configure the Enable Endpoint Protection policy setting to Yes.
Configure the Enable Endpoint Protection policy setting to No.
Explanation: Using Windows Intune Endpoint Protection or an Existing Endpoint Protection Application
To explicitly enable Windows Intune Endpoint Protection on client computers that are running another endpoint protection application that was detected by Windows Intune, you
have to create a Windows Intune policy, and then deploy it to those computers. To do so, in the Windows Intune administrator console, create a new policy, set the policy value for Enable Endpoint Protection to Yes, and deploy the policy to the appropriate computers.
After you confirm that Windows Intune Endpoint Protection is helping to secure the client computers, you can remove or disable the other endpoint protection application.
Question No: 122 DRAG DROP
You are the desktop administrator for a small company.
Three users report that their Windows 8.1 computers are performing poorly. The users must wait from three to five minutes for the login screen to appear.
You need to identify the cause of this problem. You have the following requirements:
->You must configure Windows Performance Recorder to run by use of a script on these computers.
->You must use the built-in profile.
->You must record two instances of the startup on each computer to compare and validate your findings.
Which command should you use? (To answer, drag the appropriate commands to the correct locations in the answer area. Each answer may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content.)
Wpr.exe -start GeneralProfile -onoffscenario boot -numiterations 2
wpr syntax: Syntax:
wpr -start lt;profilegt;] [-start lt;profilengt;] [-filemode] [-recordtempto lt;temp folder pathgt;][- onoffscenario lt;OnOff Transition Typegt;] [-onoffresultspath lt;path to which the trace files are savedgt;][-onoffproblemdescription lt;description of the scenariogt;] [-numiterations lt;number of iterations for OnOff tracinggt;]
wpr parameter: -numiterations
Sets the number of iterations for OnOff recording. By default, the settings from the built-in or custom profile file are used by default.
Question No: 123
You have computers that run Windows 8 Enterprise. Microsoft BitLocker Administration and Monitoring (MBAM) is deployed on your network on a server named MBAM1.
Company policy requires that within 2 hours of being started, computers that have the MBAM client installed prompt users to enable BitLocker.
You need to make changes to the Configure MBAM Services Group Policy settings.
Which two actions should you perform? (Each correct answer presents part of the solution.
Set MBAM Recovery and Hardware service endpoint to MBAM1.
Set Enter status reporting frequency (in minutes) to 120.
Set MBAM Status reporting endpoint to MBAM1.
Set Select Bitlocker Recovery Information to store to Recovery password and key package.
Set Select Bitlocker Recovery Information to store to Recovery password only.
Set Enter client checking status frequency (in minutes) to 120.
Explanation: MBAM: Real World Information
When configuring the MBAM services via Group Policy there are two policy timers that are configured.
Client Checking Status Frequency (Default: 90 Min)Status Reporting Frequency (Default: 720 Min)
These timers have corresponding registry settings that can be manually changed to initiate their checks immediately when the MBAM client is restarted. This is generally performed to more quickly initiate the user prompt for starting the encryption process as well as forcing the status reporting to update.
Question No: 124 DRAG DROP
You support Windows 8.1 Enterprise computers. AppLocker policies are deployed.
Company policy states that AppLocker must be disabled. You need to disable AppLocker.
Which three actions should you perform in sequence? (To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.)
Box 1: Delete all AppLocker rules.
Box 2: Disable the Application Identity service. Box 3: Run the gpupdate /force command.
Before you can enforce AppLocker policies, you must start the Application Identity service by using the Services snap-in console.
The Application Identity service determines and verifies the identity of an application. Stopping this service will prevent AppLocker policies from being enforced.
The gpresult command is used to display the Resultant Set of Policy (RSoP) information for a remote user and computer. And used in conjunction with the /v parameter – it displays verbose policy information. This includes detailed settings that were applied with a precedence of 1.
Question No: 125
You administer computers that run Windows 8 Pro. You have secured the computers by using BitLocker.
You have distributed a new application to the computers. Users report that file associations for ZIP archives is broken and users are unable to open ZIP files.
You need to design a solution that recovers file association. You also need to ensure that BitLocker encryption settings are maintained.
What should you do?
Restore computer from the latest restore point.
Delete the HKEY_CLASSES_ROOT\exefile\shell\open\command registry key.
Modify setting in Change default settings for media or devices.
Select Reset your PC.
Question No: 126
Your network contains an Active Directory domain. All client computers run Windows 8.1 Enterprise.
You have a client computer named Computer1 that has a shared printer named Printer1.
You need to recommend a solution to provide managers with the ability to print their print jobs before all of the other jobs in the print queue.
What should you recommend?
Modify the print processor of Printer1.
Add a new shared printer, and then modify the print processor of the new printer.
Add a new shared printer, and then modify the priority of the new printer.
Modify the priority of Printer1.
Question No: 127
You have a Windows 8.1 Pro desktop computer and a Windows RT 8.1 mobile device. You sign in to the computer and the device by using the same Microsoft account.
You discover that the settings are not being synchronized between the Windows 8.1 computer and the Windows RT 8.1 device.
You need to ensure that the settings are synchronized. What should you do first?
Enable the Trusted Hosts Group Policy setting.
Enable the Configure Default consent Group Policy setting.
From the PC settings page, click Trust this PC.
From the PC settings page, modify the Privacy settings.
Explanation: http://www.technospot.net/blogs/sync-windows-8-user-settings-pc-tablet- mobile-windows-live-id/
Question No: 128 DRAG DROP
You support Windows 8 desktop computers for a company named Contoso, Ltd. The computers are members of the Active Directory domain named contoso.com.
Contoso works with a supplier named Fabrikam, Inc. Each company has a public key infrastructure (PKI), and no public certificate authorities (CAs) are used. The Fabrikam network includes a website that is accessible from the Contoso network. The website requires SSL and mutual authentication.
You need to configure the computers to allow contoso.com domain users to access the website without any warning prompts. You also need to use the fewest certificates possible.
Which certificate or certificates should you use? (To answer, drag the appropriate certificate to the correct certificate store. Each certificate may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content.)
Fabrikam.com provided the resources. contoso.com be the trusted root authorities store
No untrusted certificates
Not allow access to local computer account (just to user account)
Question No: 129 HOTSPOT
You support computers that run Windows 8 Pro.
You plug a legacy hardware adapter into a computer. You open Device Manager and notice that the legacy hardware adapter is not listed.
You need to install the legacy hardware adapter.
To which node should you add the legacy hardware adapter? (To answer, select the appropriate object in the answer area.)
Question No: 130
You administer a Windows 8.1 Enterprise computer.
Your company wants to deploy Windows 8.1 Enterprise on 120 new computers. You have created a .win image file and placed it on a network share.
You need to create a Windows Preinstallation Environment (WinPE) media to deploy this image to new computers.
What should you do?
Download and install the Windows Automated Installation Kit (AIK), and then use the Copype tool.
Download and install the Windows Automated Installation Kit (AIK), and then use the
Download and install the Windows Assessment and Deployment Kit (ADK), and then use the Xcopy tool.
Download and install the Windows Assessment and Deployment Kit (ADK), and then use the Copype tool.
Explanation: Set up a Windows PE build environment
In this step, you create a required directory structure that supports building a Windows PE image.
->On your technician computer, click Start, point to All Programs, point
to Windows OPK or Windows AIK, and then click Windows PE Tools Command Prompt.The menu shortcut opens a Command Prompt window and automatically sets environment variables to point to all the necessary tools. By default, all tools are installed at C:\Program Files\lt;versiongt;\Tools, where lt;versiongt; can
be Windows OPK or Windows AIK.
->At the command prompt, run the Copype.cmd script.The script requires two arguments: hardware architecture and destination location. For example,copype.cmd lt;architecturegt; lt;destinationgt;where lt;architecturegt; can be x86, amd64, or ia64 and lt;destinationgt; is a path to a local directory. For
example,copype.cmd x86 c:\winpe_x86The script creates the following directory structure and copies all the necessary files for that architecture. For example,\winpe_x86\winpe_x86\ISO\winpe_x86\mount
Reference: Walkthrough: Create a Bootable Windows PE RAM Disk on CD-ROM https://technet.microsoft.com/en-us/library/cc749311(v=ws.10).aspx
EnsurePass ExamCollection Testking Lowest Price Guarantee Yes No No Up-to-Dated Yes No No Real Questions Yes No No Explanation Yes No No PDF VCE Yes No No Free VCE Simulator Yes No No Instant Download Yes No No